Analysis

  • max time kernel
    111s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 13:47

General

  • Target

    e61c57ec00fb8b3e1fce0d074d0cc7c870e924747aa749460f76ef7811a8e64d.exe

  • Size

    685KB

  • MD5

    f9c70badd453f09490c4d1457d376ae5

  • SHA1

    c9bc121f0e5d05e5d740ce75078f2257bc8de59e

  • SHA256

    e61c57ec00fb8b3e1fce0d074d0cc7c870e924747aa749460f76ef7811a8e64d

  • SHA512

    65bd1453591a78477170b731f02f607d67912a2946e8f645183dda5bf7adafaa6c6c6bc2f1c232b4577f98f42a21ac8bb36bf87b73a24c4063f2a189ad717d69

  • SSDEEP

    12288:YMr4y906rHsqtQcAfbTgLDby1boF9pGWE428fru1Volba7BINTE+nHZHwOA:wydg3fueW/rEoxmaNTE+n5H7A

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e61c57ec00fb8b3e1fce0d074d0cc7c870e924747aa749460f76ef7811a8e64d.exe
    "C:\Users\Admin\AppData\Local\Temp\e61c57ec00fb8b3e1fce0d074d0cc7c870e924747aa749460f76ef7811a8e64d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un155514.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un155514.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3676
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5211.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5211.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4560
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4560 -s 1084
          4⤵
          • Program crash
          PID:3644
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2779.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2779.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1184
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1184 -s 1948
          4⤵
          • Program crash
          PID:1620
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si822162.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si822162.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2412
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4560 -ip 4560
    1⤵
      PID:4584
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1184 -ip 1184
      1⤵
        PID:1144

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si822162.exe

        Filesize

        175KB

        MD5

        121fdd255ef4999ca52e52b429028615

        SHA1

        6a16fc0097acb0ccd96959c1e23e4d0579f99246

        SHA256

        ef5474768250239b72aa570dca21ab072a3423f22f6f660232f8efa174f37fc2

        SHA512

        413b124a343ad706c5e7d2e94dad7cec1b964eca30b0f7e2b3b87bb47634152a11c33dddf2f0c9a165ed0abc6477511dcad0ae24890bffd77593d096861b869f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si822162.exe

        Filesize

        175KB

        MD5

        121fdd255ef4999ca52e52b429028615

        SHA1

        6a16fc0097acb0ccd96959c1e23e4d0579f99246

        SHA256

        ef5474768250239b72aa570dca21ab072a3423f22f6f660232f8efa174f37fc2

        SHA512

        413b124a343ad706c5e7d2e94dad7cec1b964eca30b0f7e2b3b87bb47634152a11c33dddf2f0c9a165ed0abc6477511dcad0ae24890bffd77593d096861b869f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un155514.exe

        Filesize

        543KB

        MD5

        29eb140471cce3f3d1f6a7ab3eb6f444

        SHA1

        692371a9c78d105e2238b6cfc2d4f537a9c11e26

        SHA256

        0d28dcf29396df35caf90832c2082cc89a9843ff2725aca6164ce1a1494643fb

        SHA512

        b47426a1fd5a7a6be6bb8d72f2141802976e20c016df34d4a7bd155dcbfb62c49da4526fbb3ffe001716230eee603e158113b3e4b358cfa7b03751bf8a6baab6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un155514.exe

        Filesize

        543KB

        MD5

        29eb140471cce3f3d1f6a7ab3eb6f444

        SHA1

        692371a9c78d105e2238b6cfc2d4f537a9c11e26

        SHA256

        0d28dcf29396df35caf90832c2082cc89a9843ff2725aca6164ce1a1494643fb

        SHA512

        b47426a1fd5a7a6be6bb8d72f2141802976e20c016df34d4a7bd155dcbfb62c49da4526fbb3ffe001716230eee603e158113b3e4b358cfa7b03751bf8a6baab6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5211.exe

        Filesize

        292KB

        MD5

        2b90af72c076752ae1ed8a7c33604595

        SHA1

        f807e4b978b96c872b59c54f5b8abc47b9d65791

        SHA256

        c56acbb09fce8d9273ae55cfcea0a9d3d86472cd4a969d9e3eed355d338ce15a

        SHA512

        dcc38631958605747e256b5b9995e32874d03556694214e032964e37a6a218d1f3e2dbc98085bf524acf6d1338a6dd44d9ca5fdda36e4c965151c1a06d30f3fd

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5211.exe

        Filesize

        292KB

        MD5

        2b90af72c076752ae1ed8a7c33604595

        SHA1

        f807e4b978b96c872b59c54f5b8abc47b9d65791

        SHA256

        c56acbb09fce8d9273ae55cfcea0a9d3d86472cd4a969d9e3eed355d338ce15a

        SHA512

        dcc38631958605747e256b5b9995e32874d03556694214e032964e37a6a218d1f3e2dbc98085bf524acf6d1338a6dd44d9ca5fdda36e4c965151c1a06d30f3fd

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2779.exe

        Filesize

        350KB

        MD5

        0a11a91d92d1c3b96fb9d795392e65df

        SHA1

        eedfc17c57248af9c059b88bf63ccda563fb368b

        SHA256

        9fac97e693170cd21ff6034dba5fb2ec16235c960452346b61275aa3d240eaa8

        SHA512

        4fd4b10d0e8bae18fa5dde0850ac067584b271eba66b52190efb1725aa840356895deae0f179175248c7a12b2326259869cc844a408c622c6572370ad034db7f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2779.exe

        Filesize

        350KB

        MD5

        0a11a91d92d1c3b96fb9d795392e65df

        SHA1

        eedfc17c57248af9c059b88bf63ccda563fb368b

        SHA256

        9fac97e693170cd21ff6034dba5fb2ec16235c960452346b61275aa3d240eaa8

        SHA512

        4fd4b10d0e8bae18fa5dde0850ac067584b271eba66b52190efb1725aa840356895deae0f179175248c7a12b2326259869cc844a408c622c6572370ad034db7f

      • memory/1184-226-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/1184-1102-0x0000000005B90000-0x0000000005C9A000-memory.dmp

        Filesize

        1.0MB

      • memory/1184-1115-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

        Filesize

        64KB

      • memory/1184-1114-0x0000000007120000-0x0000000007170000-memory.dmp

        Filesize

        320KB

      • memory/1184-1113-0x00000000070A0000-0x0000000007116000-memory.dmp

        Filesize

        472KB

      • memory/1184-1112-0x0000000006A30000-0x0000000006F5C000-memory.dmp

        Filesize

        5.2MB

      • memory/1184-1111-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

        Filesize

        64KB

      • memory/1184-1110-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

        Filesize

        64KB

      • memory/1184-1109-0x0000000006860000-0x0000000006A22000-memory.dmp

        Filesize

        1.8MB

      • memory/1184-1107-0x0000000006620000-0x00000000066B2000-memory.dmp

        Filesize

        584KB

      • memory/1184-1106-0x0000000005F50000-0x0000000005FB6000-memory.dmp

        Filesize

        408KB

      • memory/1184-1105-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

        Filesize

        64KB

      • memory/1184-1104-0x0000000004F70000-0x0000000004FAC000-memory.dmp

        Filesize

        240KB

      • memory/1184-1103-0x0000000004F50000-0x0000000004F62000-memory.dmp

        Filesize

        72KB

      • memory/1184-1101-0x0000000005570000-0x0000000005B88000-memory.dmp

        Filesize

        6.1MB

      • memory/1184-228-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/1184-224-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/1184-222-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/1184-220-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/1184-218-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/1184-216-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/1184-214-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/1184-212-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/1184-191-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/1184-192-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/1184-195-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

        Filesize

        64KB

      • memory/1184-196-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/1184-199-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

        Filesize

        64KB

      • memory/1184-200-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/1184-197-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

        Filesize

        64KB

      • memory/1184-193-0x0000000000720000-0x000000000076B000-memory.dmp

        Filesize

        300KB

      • memory/1184-202-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/1184-204-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/1184-206-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/1184-208-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/1184-210-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/2412-1121-0x00000000008D0000-0x0000000000902000-memory.dmp

        Filesize

        200KB

      • memory/2412-1122-0x0000000005360000-0x0000000005370000-memory.dmp

        Filesize

        64KB

      • memory/4560-174-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4560-181-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/4560-170-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4560-182-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/4560-168-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4560-150-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/4560-180-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4560-166-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4560-153-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4560-176-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4560-151-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/4560-172-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4560-183-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/4560-184-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/4560-178-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4560-164-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4560-160-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4560-162-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4560-158-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4560-156-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4560-154-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4560-148-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/4560-149-0x0000000004E10000-0x00000000053B4000-memory.dmp

        Filesize

        5.6MB

      • memory/4560-186-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/4560-152-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB